Young-Jae Maeng
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Young-Jae Maeng.
Ksii Transactions on Internet and Information Systems | 2009
Abedelaziz Mohaisen; DaeHun Nyang; Young-Jae Maeng; Kyung-Hee Lee; Dowon Hong
In this paper, we introduce a grid-based key pre-distribution scheme in wireless sensor networks, which aims to improve the connectivity and resiliency while maintaining a reasonable overhead. We consider simplification of the key establishment logic and enhancement of the connectivity via plat polynomial assignment on a three-dimensional grid for node allocation and keying material assignment. We demonstrate that our scheme results in improvements via a detailed discussion on the connectivity, resource usage, security features and resiliency. A comparison with other relevant works from the literature along with a demonstrated implementation on typical sensor nodes shows the feasibility of the introduced scheme and its applicability for large networks.
Computers & Security | 2015
Young-Jae Maeng; Aziz Mohaisen; Mun-Kyu Lee; DaeHun Nyang
In this paper, we introduce a transaction authentication solution that provides compatibility with any banking transactions. Our solution is based on a novel visual cryptographic scheme that supports multiple uses of a single static share, unlike existing techniques in the literature of visual cryptography. To support multiple uses, we utilize complementary colors in the subtractive color mixing model. In our solution, a user is asked to overlap an issued visual cryptography card on an encrypted image that is rendered on a screen to check transaction information and transaction authentication number. We analyze the security of our scheme against various attacks and show its effectiveness using a usability study.
The Kips Transactions:partc | 2012
Young-Jae Maeng; Jeonil Kang; DaeHun Nyang; Kyung-Hee Lee
Recent two security schemes showed that a bloom filter can reduce a message length required for representing multiple MACs. The schemes, however, made message length comparison without considering security level. Since the MAC is intended for security, it is important to let multiple MACs and the bloom filter have the same level of security for making message length comparison. In this paper, we analyze the message length efficiency of bloom filter, compressed bloom filter and multiple MACs, letting them have the same security level.
The Kips Transactions:partc | 2008
Young-Jae Maeng; Abedelaziz Mohaisen; Kyung-Hee Lee; DaeHun Nyang
ABSTRACT The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.Key Words:Sensor Network, Key Pre-Distribution, Plat-Based, 3D-Grid
The Kips Transactions:partc | 2007
Young-Jae Maeng; Abedelaziz Mohaisen; Kyung-Hee Lee; DaeHun Nyang
In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys` identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.
Archive | 2007
Dea-Hun Nyang; Jeonil Kang; Young-Jae Maeng; Koon-Soon Kim
Archive | 2007
DaeHun Nyang; Young-Jae Maeng; Jeonil Kang
information security and cryptology | 2009
Ju-Hyun Kim; Young-Jae Maeng; DaeHun Nyang; Kyung-Hee Lee
information security and cryptology | 2008
Young-Jae Maeng; DaeHun Nyang
Archive | 2013
Young-Jae Maeng; Jong-Hu Lee; Hyun-Dong Park; Sangwoo Park; Eungki Park